Implementer's Guide to Deception Technologies

Implementer's Guide to Deception Technologies

In today’s digital environment, organizations tend to have difficulty detecting attackers on their networks in a reasonable time frame. The reason: Traditional detective technologies focus on finding evil, and attackers have learned to avoid looking evil to penetrate defenses. Its time to change that paradigm.

Attendees at this webcast will learn:

  • What deception technologies are all about
  • How deception technologies can assist with common attack types, including account hijacking, human error, vulnerable applications, and insider threats
  • How organizations can implement and automate deception technologies through a SOAR or SIEM
  • What open source tools are available to assist organizations in their implementation initiatives

Watch now and receive the associated whitepaper written by SANS Analyst and network/cloud security expert Kyle Dickinson.


 

Browse all Webinars